Field Note

Cybersecurity Threats of 2019

December 03, 2018

Learn more about the cybersecurity threats to keep your eye on in 2019

By Arielle Mullen

As the year winds down, we thought it might be a good time to look ahead to 2019 at the biggest cybersecurity risks that the not-so-distant future has in store. Read on to discover our picks for 2019's biggest security threats.

Phishing: In 2018, phishing attacks rose dramatically, and they show no signs of slowing for the year ahead. This particular type of scam relies on attackers using various methods to trick users into sharing their login credentials or other sensitive information. If you're a business owner concerned about your employees falling prey to a phishing attack, we recommend training them on how to identify possible scams.

Cryptojacking: Similar to phishing, cryptojacking attacks rose in 2018. This attack involves enticing the victim to download a program, which then allows criminals to utilize the computer's CPU to mine cryptocurrency (without the victim realizing it). There are several browser extensions designed to help prevent cryptojacking, including NoCoin and minerBlock for Google Chrome, or NoScript for Firefox.

Ransomware: Similar to cryptojacking, a ransomware attack starts with the user unwittingly downloading malicious software. Once the software is in place, attackers restrict access to files and demand a ransom for their release. Verizon reported that in 2017 ransomware was responsible for 39% of malware data breaches. This type of attack can be particularly damaging for businesses responsible for maintaining sensitive data. To help protect your organization from a ransomware attack, we recommend only opening emails from a known source.

Social Engineering:Social engineering is an attack where manipulation is used with the end goal of getting the user to reveal confidential information. While the form of this type of attack varies, maintaining vigilance is key. Sometimes it might look like an email from a friend or other trusted source, with an embedded link or attachment. The best way to prevent this type of attack is to practice caution when navigating your inbox. Be extremely wary of emails that come from an unknown source, contain embedded links, or attachments.

Is your organization protected and fully prepared for 2019? Schedule your consultation today and learn how becoming a ClearIT Partner can help!